Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
نویسنده
چکیده
CellHash [3] and SubHash [4] were suggested by J. Daemen, R. Govaerts and J. Vandewalle in 1991 and 1992. SubHash is an improved version from CellHash. They have 257-bit internal state and 256-bit hash output. In this paper, we show a preimage attack on CellHash (SubHash) with the complexity 2 and the memory 2 for any t (with the complexity about 2 and the memory size 2). Even though we modify them in a famous way, we show that we can find a preimage on the modified CellHash (the modified SubHash) with the complexity 2 and the memory size 2 (with the complexity about 2 and the memory size 2).
منابع مشابه
Synthesis and Characterization of Nanocrystalline Zinc Oxide Thin Films via Green Chemistry
Green chemistry is an alternative route of which has overcome the limitations of other chemical methods. Nanocrystalline zinc oxide (NC-ZnO) with different structures have been grown on quartz plates by spin coating method by the use of plant extracts of Citrus aurantifolia which can be a cost effective and eco-friendly approach.. The present exploration describes the synthesis and characteriza...
متن کاملPractical (Second) Preimage Attacks on TCS_SHA-3
TCS SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard, compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and t...
متن کاملPrevalence of Hepatitis B Virus, Genotypes, and Mutants in HBsAg-Positive Patients in Meerut, India
Background: Genetic changeability of hepatitis B virus (HBV) signifies a challenge for the sensitivity of immunologic and molecular diagnostics. Therefore, knowing the spread of HBV genotypes (GENs) and mutation has considerable impacts on treatment strategies, vaccination program, diagnosis, and prevention. The present study aimed to detect HBV GENs and mutants in HBsAg-positive patients. Meth...
متن کاملInvestigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...
متن کاملPractical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
TCS_SHA-3 is a family of four cryptographic hash functions that are covered by a United States patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2006 شماره
صفحات -
تاریخ انتشار 2006